Countermeasure against Increase of Heavy Rainfall

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Low-Cost Countermeasure against RPA

On smart-cards, Elliptic Curve Cryptosystems (ECC) can be vulnerable to Side Channel Attacks such as the Re ned Power Analysis (RPA). This attack takes advantage of the apparition of special points of the form (0, y). In this paper, we propose a new countermeasure based on co-Z formulæ and an extension of the curve isomorphism countermeasure. It permits to transform the base point P = (x, y) in...

متن کامل

3. Frequency Distributions of Heavy Rainfall Events

The data used in developing the frequency relations consisted of both daily and hourly precipitation records from Illinois and from nearby stations in surrounding states. The daily data, mostly from nonrecording raingages, spanned the 83-year period from 1901 through 1983. They included data from the 61 precipitation-reporting stations discussed previously (figure 71, whose records had been car...

متن کامل

3. Frequency Distributions of Heavy Rainfall Events

The data used in developing the frequency relations consisted of both daily and hourly precipitation records from Illinois and from nearby stations in surrounding states. The daily data, mostly from nonrecording raingages, spanned the 83-year period from 1901 through 1983. They included data from the 61 precipitation-reporting stations discussed previously (figure 71, whose records had been car...

متن کامل

Countermeasure for collusion attacks against digital watermarking

Customer identification watermarking today is one of the most promising application domains of digital watermarking. It enables to identify individual copies of otherwise indistinguishable digital copies. If done without any precautions, those individual watermarking are vulnerable to a number of specialized attacks based on an attacker collecting more than one individual copy. Fingerprinting a...

متن کامل

Leakage Squeezing Countermeasure against High-Order Attacks

In the recent years, side channel attacks have been widely investigated. In particular, second order attacks (2O-attacks) have been improved and successfully applied to break many masked implementations. In this context we propose a new concept to hinder attacks of all order: instead of injecting more entropy, we make the most of a single-mask entropy. With specially crafted bijections instanti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Water and Environment Technology

سال: 2014

ISSN: 1348-2165

DOI: 10.2965/jwet.2014.87